From patchwork Mon Aug 19 06:15:56 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Po-Hsu Lin X-Patchwork-Id: 1149040 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 46BkG05tPWz9sNp; Mon, 19 Aug 2019 16:16:23 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1hzaxk-00079B-A6; Mon, 19 Aug 2019 06:16:16 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from ) id 1hzaxh-00078t-Fm for kernel-team@lists.ubuntu.com; Mon, 19 Aug 2019 06:16:13 +0000 Received: from mail-pg1-f197.google.com ([209.85.215.197]) by youngberry.canonical.com with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1hzaxh-00052s-1F for kernel-team@lists.ubuntu.com; Mon, 19 Aug 2019 06:16:13 +0000 Received: by mail-pg1-f197.google.com with SMTP id h5so1920790pgq.23 for ; Sun, 18 Aug 2019 23:16:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id; bh=GoJwhkaNnTNcOQP5w/3aHodM5bvdzPbF6sazfclQVYY=; b=LacPfwxZZXZcFoV0egnYOVNSCOlsY1NO0yQ97FDEvX9D7iKud13qVkVog6K+AINNiJ dHu38tJZ6xYk2LCW2m4+EzktjetflL6ODJ9JgfxgCUidc+rbL70hGLvb4v3JjfnA202W q1tOxVwfyLixptRuHzTZmu2laj2iJc4E+bP7cisuyyix+GTQoASOmA9unez+/Tbx7Ib3 m5NsUZgKa5L96rhL+V3mtKNISRevTD1s+bguHgEcbGLhlxjwDAZ6dI2pJIWciEK/gpSJ 9IB95RBXz4gBqsHFDr7fRjfoJkKgwzhvuqssKQbC263tAb0wdSW4zbAyd2bXKbXtmp2Y ZZUQ== X-Gm-Message-State: APjAAAVRUtPfMyd+57h/YWl+PsdwqlSZgXcgPDUUAVQBnDOzYhvGkT/Y bAO/310u747X9f43frnMN7EVNhmIYDeMyalYuhJyoXGefaqYw14SQKV+bOHDBBCDYOx5sloE1hs cAJCWaLo+VP8e2XA60fD4KiulPm7E3wbUdc/+vkQw X-Received: by 2002:a17:902:24c:: with SMTP id 70mr12571438plc.331.1566195371517; Sun, 18 Aug 2019 23:16:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqzHkmJbTmHZGF1FDmP/Sdh1eMlvnuzyR3Y6Ru9B0Db6PjNKj8KcEHWMGZtUCsdyQ2uTY3FBIQ== X-Received: by 2002:a17:902:24c:: with SMTP id 70mr12571428plc.331.1566195371236; Sun, 18 Aug 2019 23:16:11 -0700 (PDT) Received: from Leggiero.taipei.internal (61-220-137-37.HINET-IP.hinet.net. [61.220.137.37]) by smtp.gmail.com with ESMTPSA id 4sm5743346pfe.76.2019.08.18.23.16.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 18 Aug 2019 23:16:10 -0700 (PDT) From: Po-Hsu Lin To: kernel-team@lists.ubuntu.com Subject: [X/B/D linux-kvm][SRU][PATCH 0/1] UBUNTU: [Config] Enable VXLAN module support Date: Mon, 19 Aug 2019 14:15:56 +0800 Message-Id: <20190819061559.9851-1-po-hsu.lin@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" == SRU Justification == VXLAN is used by Flannel and maybe other CNI plugins for Kubernetes, it will be great to enable the support in KVM kernels. == Fix == Enable the CONFIG_VXLAN in the config file. CONFIG_NET_UDP_TUNNEL=m and other configs were added automatically with updateconfigs. CONFIG_OPENVSWITCH_VXLAN supprt was excluded intentionally as this is not requested (and to reduce the binary size). == Test == Test kernels could be found here: https://people.canonical.com/~phlin/kernel/lp-1811819-vxlan/ Kernel smoke tested. User has also verified that all the patched kernels are working as expected. == Regression Potentail == Low, this enables the support for VXLAN module on KVM kernels, we might see some related bugs in the future. Since we already have this in the generic kernel so the impact should be small. Po-Hsu Lin (1): UBUNTU: [Config] Enable VXLAN module support debian.kvm/config/config.common.ubuntu | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) Acked-by: Stefan Bader Acked-by: Connor Kuehl